• No results found

Resilient Control under Denial-of-Service Attacks

N/A
N/A
Protected

Academic year: 2021

Share "Resilient Control under Denial-of-Service Attacks"

Copied!
2
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

University of Groningen

Resilient Control under Denial-of-Service Attacks

Feng, Shuai

IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document version below.

Document Version

Publisher's PDF, also known as Version of record

Publication date: 2018

Link to publication in University of Groningen/UMCG research database

Citation for published version (APA):

Feng, S. (2018). Resilient Control under Denial-of-Service Attacks. University of Groningen.

Copyright

Other than for strictly personal use, it is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license (like Creative Commons).

Take-down policy

If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.

Downloaded from the University of Groningen/UMCG research database (Pure): http://www.rug.nl/research/portal. For technical reasons the number of authors shown on this cover page is limited to 10 maximum.

(2)

Propositions

Resilient Control

under Denial-of-Service Attacks

Shuai Feng

1. Equipping a controller with prediction capabilities improves the resilience of the control system against Denial-of-Service (DoS) attacks.

2. For full-state measurements of the process, a predictive controller with state resetting makes it possible to maximize the amount of DoS that one can tolerate for a general class of DoS signals. 3. For partial-state measurements of the process, the gap from the

optimal bound depends on the process observability index. The optimal bound can be recovered if the sensor system is equipped with extra computation capabilities and the communication pro-tocol is acknowledgment-based.

4. In the presence of data quantization, a sucient condition on the bit rate needed to achieve stability can be given also under DoS attacks.

5. When co-location of the control unit at the process actuators is not possible, buering provides an eective way to maintain a certain level of resilience against DoS.

6. Resilience of distributed systems against DoS remains largely un-explored. Current results fail to characterize the network most critical links.

Referenties

GERELATEERDE DOCUMENTEN

Een voorbeeld: de regel dat men zijn ‘personaadjen’ in het eerste bedrijf moet introduceren slaat niet alléén op het hoofdpersonage en het in deze context gegeven citaat van Pels

Firstly, an algorithm to detect a successful DoS attack on power output sensors of a wind farm is proposed and tested in several simulations utilizing averaging of

In the analysis of inventory control it became clear that the relatively high inventory level, the lacking of an inventory control system and clear inventory rules and the lacking

Door de aanwezigheid van een bomenrij in de centrale zone van het terrein werd in het beginstadium van het onderzoek hier geen prioriteit aan gegeven, maar door de

It is hypothesized that narrative content is more effective if a low involvement product is promoted (Akbari, 2015) and the positive effect of narrative content will disappear if

Concluding, by executing three steps: transcription of audio to text by means of ASR, filtering the transcriptions using NLP techniques to obtain the content of the discussions,

The data for the independent variables comes from The World Bank Regulatory Survey by the World Bank, whereas the data for the Financial Sector Innovation Indicator

With the passing of time, sound economics, supported by antitrust policies that recognise the potential anticompetitive injury from abuses of single brand market power, will